CN109040106A - A kind of transmission control method and device of service hierarchy classification - Google Patents
A kind of transmission control method and device of service hierarchy classification Download PDFInfo
- Publication number
- CN109040106A CN109040106A CN201810987401.9A CN201810987401A CN109040106A CN 109040106 A CN109040106 A CN 109040106A CN 201810987401 A CN201810987401 A CN 201810987401A CN 109040106 A CN109040106 A CN 109040106A
- Authority
- CN
- China
- Prior art keywords
- service
- layer
- transmission control
- service request
- control method
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0807—Network architectures or network communication protocols for network security for authentication of entities using tickets, e.g. Kerberos
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
- H04L63/105—Multiple levels of security
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Storage Device Security (AREA)
Abstract
The invention discloses a kind of transmission control methods of service hierarchy classification, comprising the following steps: receiving step: receiving the service request that user terminal is sent;Service processing step: service processing is carried out according to service request to obtain service request result, the service processing includes service fractionation, and the service splits and figure layer fractionation is split and/or serviced including service clearance;Feedback step: service request result is fed back into user terminal.The present invention also provides a kind of electronic equipment and computer readable storage medium.The transmission control method of service hierarchy classification of the invention dynamically realizes that fine-grained permission controls to shared service resource according to the permission of user, including the permission control on spatially (such as administrative region) and figure layer.
Description
Technical field
The present invention relates to transmission control methods and dress that a kind of service retransmission method more particularly to a kind of service hierarchy are classified
It sets.
Background technique
Currently, common service forwarding control and device only realize and the permission of user are authenticated and controlled,
Safety verification is carried out to the request from client and permission controls.Client transmit a request to proxy server, then acts on behalf of
Server obtains content from original server and returns again to client.Client must configure forwarding agency technically to access
Other websites, such as Configuration Agent server address and port numbers in a browser.For the request by safety verification, continue
Otherwise this calling is directly interrupted in the processing of next step, return to the state of unauthorized to client.According to the type of request user
Judge whether to meet permission, the data that user's request is returned if meeting permission are not returned or returned if not meeting permission
Clear data realizes the forwarding control of most basic service.
Existing technology dynamically can not provide shared service in Service Source shared procedure, according to the permission of user
Fine-grained permission control is realized in source, including the permission control on spatially (such as administrative region) and figure layer.For example, by some
The Map Services resource-sharing of specific region is to user, or figure layer will be specified to share to user in some Service Source.When asking
The figure layer resource quantity asked is more, when service request high concurrent, if issuing original service for each figure layer, will lead to clothes
Device pressure of being engaged in increases, and request speed is slow;When the shared service resource data amount of request is larger, figure layer resource returns to low efficiency;
Server stress increases, and easily leads to the possibility of service blocking and service-Engine paralysis.
Summary of the invention
For overcome the deficiencies in the prior art, one of the objects of the present invention is to provide a kind of forwardings of service hierarchy classification
Control method, dynamic realizes that fine-grained permission controls to shared service resource, including spatially and in figure layer
Permission control.
The second object of the present invention is to provide a kind of electronic equipment, dynamic it is thin to being realized to shared service resource
The permission of granularity controls, including spatially controlling with the permission in figure layer.
The third object of the present invention is to provide a kind of computer readable storage medium, dynamic to shared service
Resource realizes fine-grained permission control, including spatially controlling with the permission in figure layer.
An object of the present invention adopts the following technical scheme that realization:
A kind of transmission control method of service hierarchy classification, includes the following steps
Receiving step: the service request that user terminal is sent is received;
Service processing step: service processing is carried out according to service request to obtain service request result, service processing includes clothes
Business is split, and service fractionation splits and/or services figure layer including service clearance and splits;
Feedback step: service request result is fed back into user terminal.
Further, further include authentication step after the receiving step, the authentication step the following steps are included:
Whether judgement has access authority with the associated subscriber identity information of service request, if it is, carrying out in next step
Processing, if it is not, then interrupting this calling, feeds back the status information of unauthorized to user terminal.
Further, subscriber identity information is obtained by following steps in the authentication step:
It sends token application and carries out safety verification to authentication server, if the verification passes, then generate user identity letter
Breath, and subscriber identity information is associated with service request;If authentication failed, this calling is interrupted, feeds back unauthorized state
To user terminal.
Further, further include resource matched step after the receiving step, the resource matched step include with
Lower step:
Whether judgement has this resource transfer qualification with the associated subscriber identity information of service request, if it is, holding
Row next step returns to resource unauthorized information to user if it is not, then interrupting this calling.
Further, in the service processing step according to service request carry out service processing using service aggregating and/
Or service splits and is operated.
Further, the service aggregating mainly comprises the steps that
Service parsing is carried out to service request;
The resource data in WMTS system is transferred according to the service request after parsing;
Map overlay is carried out to the resource data being deployed into and picture is merged to generate service request result.
Further, it includes that service clearance fractionation and/service figure layer are split that the service, which is split,;
The service clearance fractionation mainly comprises the steps that
Slice corresponding with figure layer number, line number and row number is obtained according to service request;
The coordinate on four vertex of slice is calculated according to section protocol;
Judge whether four vertex of slice are arranged in corresponding barrier range;
Slice is handled to obtain service request result according to judging result;
The service figure layer fractionation mainly comprises the steps that
Service parsing is carried out to service request;
According to figure layer mapping relations, judge whether corresponding figure layer is included within the scope of user right, if part figure layer exists
In the extent of competence of user, then figure layer is split, the figure layer belonged within the scope of user right is returned, if the figure layer of application
It is not included in the extent of competence of user, does not then return to figure layer.
Further, in service clearance splitting step, judge whether four vertex of slice are arranged in corresponding boundary line
Judged in range using injection collimation method.
The second object of the present invention adopts the following technical scheme that realization:
A kind of electronic equipment can be run on a memory and on a processor including memory, processor and storage
Computer program, the processor realize clothes described in any one of one of the object of the invention when executing the computer program
It is engaged in transmission control method at different levels.
The third object of the present invention adopts the following technical scheme that realization:
A kind of computer readable storage medium, is stored thereon with computer program, and the computer program is held by processor
The transmission control method of the service hierarchy classification as described in any one of one of the object of the invention is realized when row.
Compared with prior art, the beneficial effects of the present invention are:
The transmission control method of service hierarchy classification of the invention is according to the permission of user, dynamically to shared service resource
Fine-grained permission control is realized, including the permission control on spatially (such as administrative region) and figure layer.
Detailed description of the invention
Fig. 1 is the flow chart of the transmission control method of the service hierarchy classification in embodiment one;
Fig. 2 is the integrated stand composition of the transmission control system of the service hierarchy classification in embodiment one;
Fig. 3 is the flow chart of the authentication step in embodiment one;
Fig. 4 is the flow chart of the service aggregating step in embodiment one;
Fig. 5 is the overall flow figure of the service aggregating step in embodiment one;
Fig. 6 is the flow chart that the service clearance in embodiment one is split;
Fig. 7 is the overall flow figure that the service clearance in embodiment one is split;
Fig. 8 is the flow chart of the slicing treatment step in embodiment one;
Fig. 9 is the responding process figure of the service clearance splitting step in embodiment one;
Figure 10 is that the spatial dimension in embodiment one splits instance graph one;
Figure 11 is that the spatial dimension in embodiment one splits instance graph two;
Figure 12 is that the spatial dimension in embodiment one splits instance graph three;
Figure 13 is that the spatial dimension in embodiment one splits instance graph four;
Figure 14 is the lead determining method exemplary diagram in embodiment one;
Figure 15 is the flow chart of the service figure layer splitting step in embodiment one;
Figure 16 is the example one of the service figure layer splitting step in embodiment one;
Figure 17 is the example two of the service figure layer splitting step in embodiment one;
Figure 18 is application interface screenshot example;
Figure 19 is that the service figure layer before the fractionation in embodiment one splits screenshot one;
Figure 20 is that the service figure layer before the fractionation in embodiment one splits screenshot two;
Figure 21 is that the service figure layer after the fractionation in embodiment one splits screenshot one;
Figure 22 is that the service figure layer after the fractionation in embodiment one splits screenshot two;
Figure 23 is the screenshot one of the log recording in embodiment one;
Figure 24 is the screenshot two of the log recording in embodiment one.
Specific embodiment
In the following, being described further in conjunction with attached drawing and specific embodiment to the present invention, it should be noted that not
Under the premise of conflicting, new implementation can be formed between various embodiments described below or between each technical characteristic in any combination
Example.
Embodiment one
One, the service transmission control method process of service hierarchy classification
Service-Engine essence is a HTTP Reverse Proxy, and the http request of entrance is passed through in a series of
Between part (Middleware) processing, including purview certification, service forwarding, service processing, the processes such as service discovery, finally by
HTTP server returns to user.Entire server uses the design pattern of pipeline, and the scalability of system is strong.Middleware phase each other
It is mutually independent, relevant intermediate treatment process can be added or reduced according to the needs of business.
Entire server uses the design pattern of pipeline, and the scalability of system is strong.Middleware is mutually independent, Ke Yigen
According to the needs of business, relevant intermediate treatment process is added or reduced.
The design of system carries out Dynamic injection to different services by the way of relying on injection, is realized using caching mechanism
Effective monitoring, record, the management of Service Instance.Its overall architecture is as shown in Figure 2:
Two, entitlement
Entitlement is injected into service-Engine as middleware, carries out safety verification and power to the request from client
Limit control.For the request by safety verification, continue the processing of next step, otherwise directly interrupt this calling, return is not awarded
The state of power is to client.
The authentication server secure verification servers unified as platform, preserve the essential information and power of user and resource
Limit information, verifying and authorization for user.Protected object of the service-Engine as resource is associated with authentication server holding.
When client is by service-Engine access platform resource, needs to obtain token from authentication server, pass through token and service-Engine
Exchange resource information.
Three, resource matched
After the request through safety certification from client, engine gets what this client possessed by its token
Access authorization for resource information, if the resource service of request so executes next module in the scope of resource of authorization, i.e. resource takes
Business request processing.Otherwise illustrate the client within user's system of platform but there is no to requested resource authorization,
This calling is then directly interrupted, returns to resource unauthorized information to client.
Four, service processing
Service aggregating: in the manufacturing process of electronic map, often electronic map (or image) and map label point
Come production (slice), facilitates different special layers to be superimposed and shows.But this mode is called to front end and is made troubles, and is needed
Base map and mark is requested to show that service aggregating can be well solved this problem to be superimposed simultaneously.
Multiple services (picture) are overlapped and are merged on backstage using the technology of service aggregating, are rendered to individual figure
Piece is externally shown and is called in the form of a new address of service.
Service is split: service is divided into two ways, the fractionation in fractionation and figure layer spatially.Space splits (horizontal
To) refer to that spatially range carries out cutting filtering for map service, forms different services.It is for one that figure layer, which splits (longitudinal direction),
Service is there are in the case where multiple figure layers, and original service itself is there is also the ability that figure layer controls, as OGC WMS,
The MapServer of ArcGIS is serviced, and can form the service of single figure layer by conversion and mapping in logic.In this implementation
It mainly completes to realize using above-mentioned technology in example, specific embodiment is as follows.
As shown in Figure 1, present embodiments providing a kind of transmission control method of service hierarchy classification, include the following steps
S1: the service request that user terminal is sent is received;When carrying out service request, user can be according to the actual situation
The permission for making requests, but requesting should be in the due extent of competence of their own, if it exceeds the permission of oneself is then not
Give display;
S11: whether judgement has access authority with the associated subscriber identity information of service request, if it is, carrying out down
The processing of one step, if it is not, then interrupting this calling, feeds back the status information of unauthorized to user terminal.It is provided with carrying out authentication
When carried out there are two types of mode, the first is assigned directly when user carries out account application directly to user
Corresponding identity information, these identity informations include access authority, call permission and base identity information;These base identities
Information includes being stated department etc..Second is temporarily to be assigned information to user when calling, as shown in figure 3, it has
Body mode of operation is as follows: sending token application and carries out safety verification to authentication server, if the verification passes, then generates user
Identity information, and subscriber identity information is associated with service request;If authentication failed, this calling is interrupted, feedback is not awarded
Power state is to user terminal.This step primarily to verifying user whether have the permission for being able to enter the resource system, if
After having, the operation of next step can be carried out.
S12: whether judgement has this resource transfer qualification with the associated subscriber identity information of service request, if so,
It then performs the next step suddenly, if it is not, then interrupting this calling, returns to resource unauthorized information to user.It in this way can be further
The flexibility for ensureing authority distribution, to guarantee the reasonability that resource is transferred.Although resource system can be entered in previous step user
System, but due in order to guarantee that the smooth operation of system and level are clearly demarcated, it is also necessary to verify user and whether have and call resource
Qualification, for example in geology bureau, chief has higher-rights, can transfer and distribute all resources, but it is other at
Member is merely able to access corresponding resource, is unable to carry out integration processing to resource;The purpose for the arrangement is that in order to guarantee system
Reasonability.After the request through safety certification from client, engine gets this client by its token and possesses
Access authorization for resource information, if request resource service next module, i.e. resource are so executed in the scope of resource of authorization
Service request handling.Otherwise illustrate the client within user's system of platform but requested resource is not awarded
Power then directly interrupts this calling, returns to resource unauthorized information to client.
S2: carrying out service processing according to service request to obtain service request result, and the service processing includes that service is split,
And it includes that service clearance splits and/or service figure layer fractionation that the service, which is split,;Service processing in the service processing step
It further include service aggregating.
As shown in Figure 4 and Figure 5, in the manufacturing process of electronic map, often electronic map (or image) and map
Mark separates production (slice), facilitates different special layers to be superimposed and shows.But this mode is called to front end and is brought not
Just, it needs that base map and mark is requested to show that service aggregating can be well solved this problem to be superimposed simultaneously.
Multiple services (picture) are overlapped and are merged on backstage using the technology of service aggregating, are rendered to individual figure
Piece is externally shown and is called in the form of a new address of service.The service aggregating mainly comprises the steps that
Service parsing is carried out to service request;Here service request is at least two;According to the service request after parsing
Transfer the resource data in WMTS system;Map overlay is carried out to the resource data being deployed into and picture is merged and asked with generating service
Seek result.
Service for user's request processes, and judges whether the service of request has polymerization.
public void MapAccess(HttpContext context)
Processing polymerization.Only one does not need to polymerize for the service of polymerization, if polymerization service have it is multiple if handle polymerization.
public Stream Run(HttpContext context)
It is thereon the specific one of specific embodiment of service.
The scope control of figure is to be divided to control according to the administrative boundary in administrative area.The range permission of the map slice of request
Information can be obtained in the body of a map or chart controlled attribute for the resource information that a upper middleware is got or be carried by URL.Such as
Fruit is provided with body of a map or chart controlled attribute, then engine is handled the resource after request resource returns, if the slice is complete
It include entirely then to return to whole slices within configured administrative boundary;If slice a part is included within administrative boundary
The slice is split, only display includes the content within administrative boundary;If not intra vires if return to blank
Slice.If not doing scope control returns to whole slices.As shown in Fig. 6, Fig. 7 and Fig. 9, the service clearance splits main packet
Include following steps:
Slice corresponding with figure layer number, line number and row number is obtained according to service request;By URL directly acquire figure layer number,
Line number, row number;
As shown in figure 8, it is specific slicing treatment mode: calculating the seat on four vertex of slice according to section protocol
Mark;Judge whether four vertex of slice are arranged in corresponding barrier range;Judge whether four vertex of slice are arranged in
Judged in corresponding barrier range using injection collimation method.Wherein judge vertex position all whether setting administrative boundary
What is utilized in range (polygon point set) is that injection collimation method judges that a little whether in polygon, concrete principle process is as follows: injection
Collimation method: go out ray of carrying out the coffin upon burial from target point, see the intersection point number of this ray and all sides of polygon.If there is odd number is handed over
Point, then explanation is in inside, and if there is even number intersection point, then explanation is in outside.
As shown in figure 14, specific practice: the Y coordinate of test point is compared with each point of polygon, can be obtained
The list of the intersection point of row and polygon edge where one test point.There are 8 sides and test point institute in this example of the following figure
Row intersection, and there are 6 sides not intersect.The test point is more if the number of two edge points of test point is all odd number
In the shape of side, otherwise outside polygon.There are 5 intersection points on the left side of test point in this example, and there are three intersection points on the right, they are all
It is odd number, so point is in polygon.
Wherein the specific example of slicing treatment mode is as follows:
// judge whether the slice needs to cut out
public bool CheckServiceExtent(ServiceModel istm,Bbox bbox,ref bool
fullContain,ref List<Bbox>polygonBbox,ref List<RangeModel>resultRanges)
//MapServer type slicing treatment middleware
MapServerTProxyMiddleware(Invoke)
// slice forward process function
static async Task<int>WebRequest(string url,IOwinContext context,Lrc
tileLrc,List<Bbox>polygonBox,List<RangeModel>resultRanges,string innerUrl,
string baseReplaceUrl)
Slice is handled to obtain service request result according to judging result;
Service for application is parsed, and judges the figure layer of application, and engine gets this client by its token and gathers around
Some access authorization for resource information, the extent of competence of the correspondence user then stored according to library in data judge whether the figure layer of application wraps
It is contained in the extent of competence of user.If being included within the scope of user right, the figure layer of application is returned to, if part figure layer is in user
Extent of competence in, then data layer is split, by the figure layer belonged within the scope of user right return;If the figure layer of application
It is not included in the extent of competence of user, does not then return to element.Above-mentioned is concrete implementation mode, in the actual operation process
Situation, as shown in Figure 10, Figure 11, Figure 12 and Figure 13;It is capable of the result of visual pattern finding out space and splitting.
As shown in Figure 15, Figure 16 and Figure 17, the service figure layer fractionation is mainly comprised the steps that
Service parsing is carried out to service request;
According to figure layer mapping relations, judge whether corresponding figure layer is included within the scope of user right, if part figure layer exists
In the extent of competence of user, then figure layer is split, the figure layer belonged within the scope of user right is returned, if the figure layer of application
It is not included in the extent of competence of user, does not then return to figure layer.It is specific as follows to carry out the mode that service figure layer is split:
public void MapAccess(HttpContext context)
Construction splits the parameter of service, according to different requests the different parameter of type structure.
The result returned for request processes, and different processing is done according to different types.
public RequestParam GetConstructMapUrl(HttpAccess ha,string extra,
string param,string result)private long MapServerRequestHandler(string url,
string tokens,HttpAccess httpAccess,HttpContext context,RequestParam r)
Such as Figure 18, it is specific application interface, can select corresponding service operations according to the interface.Figure 19, Figure 20,
Figure 21 and Figure 22 be split front and back both comparison diagram, by the comparison diagram be capable of ocular and clear find out experience service split before
The difference of the two afterwards.
S3: service request result is fed back into user terminal.The design of system is by the way of relying on injection to different clothes
Business carries out Dynamic injection, and effective monitoring, record, the management of Service Instance are realized using caching mechanism.Specific log recording is such as
Shown in Figure 23 and Figure 24.
According to the permission of user, fine-grained permission, which controls, dynamically to be realized to shared service resource, including spatially (example
Such as administrative region) and figure layer on permission control.For example, by the Map Services resource-sharing of some specific region to user, or
Person will specify figure layer to share to user in some Service Source.And it is big to solve server stress, easily lead to service blocking with
And the possibility of service-Engine paralysis.Multi-layer image, multidata forwarding are avoided, server stress is alleviated, service is improved and turns
Send out speed and efficiency
Embodiment two
Embodiment two discloses a kind of electronic equipment, which includes processor, memory and program, wherein locating
One or more can be used in reason device and memory, and program is stored in memory, and is configured to be executed by processor,
When processor executes the program, the transmission control method of the service hierarchy classification of embodiment one is realized.The electronic equipment can be
The a series of electronic equipment of mobile phone, computer, tablet computer etc..
Embodiment three
Embodiment three discloses a kind of computer readable storage medium, and the storage medium is for storing program, and the journey
When sequence is executed by processor, the transmission control method of the service hierarchy classification of embodiment one is realized.
Certainly, a kind of storage medium comprising computer executable instructions, computer provided by the embodiment of the present invention
The method operation that executable instruction is not limited to the described above, can also be performed in method provided by any embodiment of the invention
Relevant operation.
By the description above with respect to embodiment, it is apparent to those skilled in the art that, the present invention
It can be realized by software and required common hardware, naturally it is also possible to which by hardware realization, but in many cases, the former is more
Good embodiment.Based on this understanding, technical solution of the present invention substantially in other words contributes to the prior art
Part can be embodied in the form of software products, which can store in computer readable storage medium
In, floppy disk, read-only memory (Read-Only Memory, ROM), random access memory (Random such as computer
Access Memory, RAM), flash memory (FLASH), hard disk or CD etc., including some instructions use so that an electronic equipment
(can be personal computer, server or the network equipment etc.) executes method described in each embodiment of the present invention.
It is worth noting that, in the above-mentioned embodiment based on content update notice device, included each unit and mould
Block is only divided according to the functional logic, but is not limited to the above division, and is as long as corresponding functions can be realized
It can;In addition, the specific name of each functional unit is also only for convenience of distinguishing each other, the protection model being not intended to restrict the invention
It encloses.
The above embodiment is only the preferred embodiment of the present invention, and the scope of protection of the present invention is not limited thereto,
The variation and replacement for any unsubstantiality that those skilled in the art is done on the basis of the present invention belong to institute of the present invention
Claimed range.
Claims (10)
1. a kind of transmission control method of service hierarchy classification, which is characterized in that include the following steps
Receiving step: the service request that user terminal is sent is received;
Service processing step: service processing is carried out according to service request to obtain service request result, the service processing includes clothes
Business is split, and service fractionation splits and/or services figure layer including service clearance and splits;
Feedback step: service request result is fed back into user terminal.
2. the transmission control method of service hierarchy as described in claim 1 classification, which is characterized in that the receiving step it
After further include authentication step, the authentication step the following steps are included:
Whether judgement has access authority with the associated subscriber identity information of service request, if it is, be further processed,
If it is not, then interrupting this calling, the status information of unauthorized is fed back to user terminal.
3. the transmission control method of service hierarchy classification as claimed in claim 2, which is characterized in that used in the authentication step
Family identity information is obtained by following steps:
It sends token application and carries out safety verification to authentication server, if the verification passes, then generate subscriber identity information, and
Subscriber identity information is associated with service request;If authentication failed, this calling, feedback unauthorized state to user are interrupted
End.
4. the transmission control method that the service hierarchy as described in any one of claim 1-3 is classified, which is characterized in that in institute
Stating after receiving step further includes resource matched step, the resource matched step the following steps are included:
Whether judgement has this resource transfer qualification with the associated subscriber identity information of service request, if it is, under executing
One step returns to resource unauthorized information to user if it is not, then interrupting this calling.
5. the transmission control method of service hierarchy classification as described in claim 1, which is characterized in that the service processing step
In service processing further include service aggregating.
6. the transmission control method of service hierarchy classification as claimed in claim 5, which is characterized in that the service aggregating is main
The following steps are included:
Service parsing is carried out to service request;
The resource data in WMTS system is transferred according to the service request after parsing;
Map overlay is carried out to the resource data being deployed into and picture is merged to generate service request result.
7. the transmission control method of service hierarchy classification as described in claim 1, which is characterized in that
The service clearance fractionation mainly comprises the steps that
Slice corresponding with figure layer number, line number and row number is obtained according to service request;
The coordinate on four vertex of slice is calculated according to section protocol;
Judge whether four vertex of slice are arranged in corresponding barrier range;
Slice is handled to obtain service request result according to judging result;
The service figure layer fractionation mainly comprises the steps that
Service parsing is carried out to service request;
According to figure layer mapping relations, judge whether corresponding figure layer is included within the scope of user right, if part figure layer is in user
Extent of competence in, then figure layer is split, by the figure layer belonged within the scope of user right return, if application figure layer do not wrap
It is contained in the extent of competence of user, does not then return to figure layer.
8. the transmission control method of service hierarchy classification as claimed in claim 7, which is characterized in that split and walk in service clearance
In rapid, judge whether four vertex of slice are arranged in corresponding barrier range and judged using injection collimation method.
9. a kind of electronic equipment including memory, processor and stores the meter that can be run on a memory and on a processor
Calculation machine program, which is characterized in that the processor realizes any one of claim 1-8 institute when executing the computer program
The transmission control method for the service hierarchy classification stated.
10. a kind of computer readable storage medium, is stored thereon with computer program, it is characterised in that: the computer program
The transmission control method of the service hierarchy classification as described in claim 1-8 any one is realized when being executed by processor.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810987401.9A CN109040106A (en) | 2018-08-28 | 2018-08-28 | A kind of transmission control method and device of service hierarchy classification |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810987401.9A CN109040106A (en) | 2018-08-28 | 2018-08-28 | A kind of transmission control method and device of service hierarchy classification |
Publications (1)
Publication Number | Publication Date |
---|---|
CN109040106A true CN109040106A (en) | 2018-12-18 |
Family
ID=64625559
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810987401.9A Pending CN109040106A (en) | 2018-08-28 | 2018-08-28 | A kind of transmission control method and device of service hierarchy classification |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109040106A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110636341A (en) * | 2019-10-25 | 2019-12-31 | 四川虹魔方网络科技有限公司 | Large-concurrency supporting multi-level fine-grained caching mechanism launcher interface optimization method |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101087187A (en) * | 2007-05-22 | 2007-12-12 | 网御神州科技(北京)有限公司 | A method and device for secure access control based on user |
CN101729403A (en) * | 2009-12-10 | 2010-06-09 | 上海电机学院 | Access control method based on attribute and rule |
KR20110119021A (en) * | 2010-04-26 | 2011-11-02 | 주식회사 에스원 | A setting method of digital-map for region rating |
CN102968442A (en) * | 2012-10-22 | 2013-03-13 | 武大吉奥信息技术有限公司 | Network map tile service aggregation method and system |
CN103049549A (en) * | 2012-12-27 | 2013-04-17 | 国家海洋信息中心 | Island data management method and system |
CN105185222A (en) * | 2015-09-24 | 2015-12-23 | 百度在线网络技术(北京)有限公司 | Method and apparatus for rendering and showing maps |
CN105915535A (en) * | 2016-05-24 | 2016-08-31 | 北京朋创天地科技有限公司 | Virtual resource access control method based on user identity |
CN107291829A (en) * | 2017-05-27 | 2017-10-24 | 西安未来国际信息股份有限公司 | A kind of information resource authority limits managing method based on LBS |
-
2018
- 2018-08-28 CN CN201810987401.9A patent/CN109040106A/en active Pending
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101087187A (en) * | 2007-05-22 | 2007-12-12 | 网御神州科技(北京)有限公司 | A method and device for secure access control based on user |
CN101729403A (en) * | 2009-12-10 | 2010-06-09 | 上海电机学院 | Access control method based on attribute and rule |
KR20110119021A (en) * | 2010-04-26 | 2011-11-02 | 주식회사 에스원 | A setting method of digital-map for region rating |
CN102968442A (en) * | 2012-10-22 | 2013-03-13 | 武大吉奥信息技术有限公司 | Network map tile service aggregation method and system |
CN103049549A (en) * | 2012-12-27 | 2013-04-17 | 国家海洋信息中心 | Island data management method and system |
CN105185222A (en) * | 2015-09-24 | 2015-12-23 | 百度在线网络技术(北京)有限公司 | Method and apparatus for rendering and showing maps |
CN105915535A (en) * | 2016-05-24 | 2016-08-31 | 北京朋创天地科技有限公司 | Virtual resource access control method based on user identity |
CN107291829A (en) * | 2017-05-27 | 2017-10-24 | 西安未来国际信息股份有限公司 | A kind of information resource authority limits managing method based on LBS |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110636341A (en) * | 2019-10-25 | 2019-12-31 | 四川虹魔方网络科技有限公司 | Large-concurrency supporting multi-level fine-grained caching mechanism launcher interface optimization method |
CN110636341B (en) * | 2019-10-25 | 2021-11-09 | 四川虹魔方网络科技有限公司 | Large-concurrency supporting multi-level fine-grained caching mechanism launcher interface optimization method |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10965772B2 (en) | Interface invocation method and apparatus for hybrid cloud | |
US10708289B2 (en) | Secured event monitoring leveraging blockchain | |
CA3025198C (en) | Tenant-aware distributed application authentication | |
CN102843366B (en) | A kind of network resource accession authority control method and device | |
CN111191210B (en) | Method and device for controlling data access authority, computer equipment and storage medium | |
CN108200146B (en) | Method for realizing lightweight microservice architecture | |
US8590003B2 (en) | Controlling access to resources by hosted entities | |
EP2807814B1 (en) | Document communication runtime interfaces | |
CN104168333B (en) | The working method of PROXZONE service platforms | |
CN103490886B (en) | The verification method of permissions data, apparatus and system | |
AU2012315674B9 (en) | Parameter based key derivation | |
CN102947797A (en) | Online service access controls using scale out directory features | |
CN107196951A (en) | The implementation method and firewall system of a kind of HDFS systems fire wall | |
US8694993B1 (en) | Virtualization platform for secured communications between a user device and an application server | |
CN101729541A (en) | Method and system for accessing resources of multi-service platform | |
CN106021375B (en) | Data bank access method and database broker node | |
US8812631B2 (en) | Method and arrangement for operating a computer cluster | |
CN108805516A (en) | A kind of mobile office system based on ERP | |
CN109783595B (en) | Routing and distribution method of loose sliced map service | |
CN110390209A (en) | Creation data access method and device | |
CN109040106A (en) | A kind of transmission control method and device of service hierarchy classification | |
US20230368191A1 (en) | Database representation of a public trust ledger | |
Kumar et al. | Real geo‐time‐based secured access computation model for e‐Health systems | |
CN115603958A (en) | Login data processing method and device, computer equipment and storage medium | |
US12039496B2 (en) | Tenant data residency requirements enforcement in multitenant collaborative work environments |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20181218 |
|
RJ01 | Rejection of invention patent application after publication |